Exploring new attack vectors for the exploitation of smartphones
Abridged Summary:

This unique technical analysis is the work of Laurent Simon’s thesis, and the original PDF can be found here, https://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-909.pdf

Smartphones have evolved quickly into powerful miniature computing platforms. Today’s smartphones are yesterday’s supercomputers. They are multi-tenant platforms, the vast majority of smartphone OS’s [ Android and iOS ] are built upon unix.

Unique Attack Vectors:

One such characteristic is the sheer number of sensors and peripherals, such as anaccelerometer, a gyroscope and a built-in camera. These sensors can be abused to track user’s PIN inputs. In addition, side-channel exploits in hardware and software specific to smartphones can reveal what users are typing.

Another threat vector is theft or loss of a smartphone. This is impactful because users carry smartphones everywhere. This increases therisk of theft or loss. In fact, in 2013 alone, 1M devices were stolen in the USA, and 12000 in London.

[ 1 ]

Yet another characteristic of the smartphone ecosystem if the pace at which new devices are released: users tend to replace their phone about every 2 years, compared to 5 years for their personal computers.

For already 60% of users today the purchase ofa new smartphone is partly funded by selling the previous one. This can have privacy implications if the previous owner’s personal data is not properly erased.

[ 2 ]

http://www.consumerreports.org/cro/news/2014/04/smart-phone-thefts-rose-to-3-1-million-last-year/index.htm
[ 1 ]

https://www.gartner.com/newsroom/id/2986617

[ 2 ]

This technical analysis is the work of Laurent Simon’s thesis at Cambridge University Computer laboratory. Please find the thesis in its entirety here:

https://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-909.pdf


Leave a Reply

Your email address will not be published. Required fields are marked *